Executive Summary
Summary | |
---|---|
Title | Microsoft Windows SMB Tree Connect Response denial of service vulnerability |
Informations | |||
---|---|---|---|
Name | VU#867968 | First vendor Publication | 2017-02-02 |
Vendor | VU-CERT | Last vendor Modification | 2017-03-17 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#867968Microsoft Windows SMB Tree Connect Response denial of service vulnerabilityOverviewMicrosoft Windows contains a memory corruption bug in the handling of SMB traffic, which may allow a remote, unauthenticated attacker to cause a denial of service on a vulnerable system. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThis vulnerability was publicly reported by PythonResponder. This document was written by Will Dormann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/867968 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-476 | NULL Pointer Dereference |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-02-03 | Microsoft Windows SMBv2/SMBv3 Buffer Overflow attempt RuleID : 41499-community - Revision : 6 - Type : SERVER-SAMBA |
2017-03-07 | Microsoft Windows SMBv2/SMBv3 Buffer Overflow attempt RuleID : 41499 - Revision : 6 - Type : SERVER-SAMBA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-03-15 | Name : The remote Windows host is affected multiple vulnerabilities. File : smb_nt_ms17-012.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-03-23 21:24:27 |
|
2017-03-18 13:24:38 |
|
2017-03-17 17:23:01 |
|
2017-02-03 21:23:39 |
|
2017-02-02 21:21:13 |
|